General

  • Target

    f974de8f3c4c363112d61baffdf72e34911458b999b3994b5713ed0c3a1bec88

  • Size

    1.7MB

  • Sample

    221201-td3ksadh49

  • MD5

    d342545cee7a75b36e22a51c6014f24b

  • SHA1

    1ff4c3d122e800c5bcdd5f5d28b8028f7d5ec565

  • SHA256

    f974de8f3c4c363112d61baffdf72e34911458b999b3994b5713ed0c3a1bec88

  • SHA512

    a70af35f0192c79a41f171f80f00f0d2895a8d560ab81db92c56562638592e600a4f9f71d8b778b5d3c2611de22e86dc1befe99e8de7e9da9ff46e249fcfffed

  • SSDEEP

    49152:KGCZVJhdKsafhKtGqKIBwiCd99q5sTU83lMq:KGoVQsafUGimU5sTU/q

Score
8/10
upx

Malware Config

Targets

    • Target

      f974de8f3c4c363112d61baffdf72e34911458b999b3994b5713ed0c3a1bec88

    • Size

      1.7MB

    • MD5

      d342545cee7a75b36e22a51c6014f24b

    • SHA1

      1ff4c3d122e800c5bcdd5f5d28b8028f7d5ec565

    • SHA256

      f974de8f3c4c363112d61baffdf72e34911458b999b3994b5713ed0c3a1bec88

    • SHA512

      a70af35f0192c79a41f171f80f00f0d2895a8d560ab81db92c56562638592e600a4f9f71d8b778b5d3c2611de22e86dc1befe99e8de7e9da9ff46e249fcfffed

    • SSDEEP

      49152:KGCZVJhdKsafhKtGqKIBwiCd99q5sTU83lMq:KGoVQsafUGimU5sTU/q

    Score
    8/10
    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks